By Topic

Software Specification and Design, 2000. Tenth International Workshop on

Date 7-7 Nov. 2000

Filter Results

Displaying Results 1 - 23 of 23
  • Tenth International Workshop on Software Specification and Design. IWSSD-10 2000

    Publication Year: 2000
    Request permission for commercial reuse | PDF file iconPDF (149 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2000, Page(s): 201
    Request permission for commercial reuse | PDF file iconPDF (39 KB)
    Freely Available from IEEE
  • Formalising ERP selection criteria

    Publication Year: 2000, Page(s):115 - 122
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (612 KB)

    We present a proposal for selecting enterprise resource planning (ERP) products from a formal description of their relevant characteristics. The work is based on a previous and successfull collaboration with a midsize company in the field of software package selection. An ERP was selected following a systematic methodology called SHERPA. In past experience, SHERPA relied on natural language descri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design guidance through the controlled application of constraints

    Publication Year: 2000, Page(s):195 - 199
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (420 KB)

    Seeks to facilitate the development of high-quality software designs and architectures by using rigorous process definitions to guide the application of the complex structure of relations and constraints that define well-formedness. We identify various types of constraints and demonstrate specific instances of these types. We endorse the value of maintaining the integrity of these constraints by r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Problems and deficiencies of UML as a requirements specification language

    Publication Year: 2000, Page(s):11 - 22
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (892 KB)

    In recent years, UML has become a standard language for modeling software requirements and design. We investigate the suitability of UML as a semiformal requirements specification language. Using the Teleservices and Remote Medical Care (TRMCS) case study as an example, we identify and demonstrate various problems and deficiencies of UML, particularly concerning use case models and system decompos... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and development assessment

    Publication Year: 2000, Page(s):105 - 114
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1040 KB)

    An assessment methodology is described and illustrated. This methodology separates assessment into the following phases: (1) elicitation of requirements; (2) elicitation of failure modes and their impact (risk of loss of requirements); (3) elicitation of failure mode mitigations and their effectiveness (degree of reduction of failure modes); and (4) calculation of outstanding risk taking the mitig... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formal tools for managing inconsistency and change in RE

    Publication Year: 2000, Page(s):171 - 181
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (964 KB)

    Dealing with inconsistencies and change in requirements engineering (RE) is known to be a difficult problem. We propose a formal, integrated approach to inconsistency handling and requirements evolution with a focus on providing automated support. We define a novel representation scheme that is expressive and able to maintain several key semantic distinctions. Based on this scheme, we define a too... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Specification, safety and reliability analysis using stochastic Petri net models

    Publication Year: 2000, Page(s):123 - 132
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (848 KB)

    We focus on the specification and assessment of stochastic Petri net (SPN) models to evaluate the design of an embedded system for reliability and availability. The system provides dynamic driving regulation (DDR) to improve vehicle derivability (anti-skid, -slip and steering assist). A functional SPN abstraction was developed for each of three subsystems that incorporate mechanics, failure modes/... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Specification and analysis of timed and functional TRMCS behaviours

    Publication Year: 2000, Page(s):31 - 37
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (548 KB)

    In this paper different specifications of the Remote Medical Care System are given by concentrating on both functional behaviour and timed behaviour. The analysis of these specifications puts forward critical system states that should be dealt with care during the system implementation. Full details on the design decisions are given View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Duration properties over real time system designs

    Publication Year: 2000, Page(s):51 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (764 KB)

    Constraints on the accumulated sojourn time at particular system states are among the possible requirements for a real-time system. These requirements are called duration properties. The need to predict temporal behavior of critical real-time systems has encouraged the development of a useful collection of results for run-time scheduling as well as an interesting set of formal automatic techniques... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The dangerous “All” in specifications

    Publication Year: 2000, Page(s):191 - 193
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (196 KB)

    Rupp and Gotz (see CONQUEST-1, 1st Conf. Quality Engineering in Software Technology, Nurnberg, Germany, 1997) observe that some, but not all, requirement specification sentences involving universal quantification, are dangerous because they are usually not true. Jackson and Zave (see Proc. Int. Symp. Requirements Engineering, IEEE Computer Society, p.56-64, 1993) provide a classification of requir... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The complexity of TRMCS-like spiral specification

    Publication Year: 2000, Page(s):183 - 190
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (608 KB)

    Modern software is often constructed using “spiral specification”; i.e. the specification is a dynamic document that is altered by experience with the current version of the system. Mathematically, many of the sub-tasks within spiral specification belong to the NP-complete class of tasks. In the traditional view of computer science, such tasks are fundamentally intractable and only sol... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hybrid model visualization in requirements and design: a preliminary investigation

    Publication Year: 2000, Page(s):3 - 9
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (548 KB)

    This paper reports on a preliminary investigation into applying work on graphic animation of behavioral models to an air traffic control case study-the National Air Traffic Services (NATS) Short Term Conflict Alert (STCA) system that advises controllers of potential conflicts between aircraft in controlled airspace. Graphic animation permits a model to be visualized in the context of a problem dom... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Issues in analyzing the behavior of event dispatching systems

    Publication Year: 2000, Page(s):95 - 103
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (676 KB)

    A good architecture is a necessary condition to guarantee that the expected levels of performance, availability, fault tolerance and scalability are achieved by the implemented system. While in the software architecture domain several approaches focus on checking static characteristics of software systems, a general approach to performance analysis, independent from a specific application domain, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using XML to build consistency rules for distributed specifications

    Publication Year: 2000, Page(s):141 - 148
    Cited by:  Papers (3)  |  Patents (42)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (676 KB)

    The work presented is part of a large programme of research aimed at supporting consistency management of distributed documents on the World Wide Web. We describe an approach for specifying consistency rules for distributed partial specifications with overlapping contents. The approach is based on expressing consistency rules using XML and XPointer. We present a classification for different types ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An approach to preserving sufficient correctness in open resource coalitions

    Publication Year: 2000, Page(s):159 - 170
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1156 KB)

    Most software that most people use most of the time needs only moderate assurance of fitness for its intended purpose. Unlike high-assurance software, where the severe consequences of failure justify substantial investment in validation, everyday software is used in settings in which occasional degraded service or even failure is tolerable. Unlike high-assurance software, which has been the subjec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model checking implicit-invocation systems

    Publication Year: 2000, Page(s):23 - 30
    Cited by:  Papers (9)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (476 KB)

    While implicit invocation (publish-subscribe) systems have good engineering properties, they are difficult to reason about and to test. Model checking such systems is an attractive alternative. However, it is not clear what kinds of state models are best suited for this. We propose a structural approach, which factors the model checking problem into two parts: behavior specific to a particular imp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software architecture analysis based on statechart semantics

    Publication Year: 2000, Page(s):133 - 137
    Cited by:  Papers (4)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (464 KB)

    High assurance architecture-based and component-based software development relies fundamentally on the quality of the components of which a system is composed and their configuration. Analysis over those components and their integration as a system plays a key role in the software development process. This paper describes an approach to develop and assess architecture and component-based systems b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dependency relations between models in the Unified Process

    Publication Year: 2000, Page(s):149 - 157
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (592 KB)

    The goal of the Unified Process is to guide developers in efficiently implementing and deploying systems that meet customer needs. During the Unified Process, a variety of models of the system are developed. All these models are not independent, they are related to each other. Elements in one model have trace dependencies to other models: they are semantically overlapping and together represent th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Object-oriented modeling and automated analysis of a telemedicine application

    Publication Year: 2000, Page(s):39 - 49
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (760 KB)

    As the impact of and demand for software increases, there is greater need for rigorous software development techniques that can be used by a typical software engineer. We have added formal syntax and semantics definitions to an existing object-oriented modeling notation in order to integrate informal and formal approaches to software development. This formalization enables developers to construct ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Superposing connectors

    Publication Year: 2000, Page(s):87 - 94
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (668 KB)

    The ability to construct architectural connectors in a systematic and controlled way has been argued to promote reuse and incremental development, e.g., as a way of superposing, a la carte, services like security, over a given communication protocol. Towards this goal, we present a notion of high-order connector, i.e., a connector that takes connectors as parameters, for superposing coordination m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The declarative problem frame: designing systems that create and use norms

    Publication Year: 2000, Page(s):75 - 85
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (912 KB)

    This paper analyzes design guidelines for reactive systems that control a social environment. In contrast to a physical environment, a social environment cannot be controlled by physical calculation, but it can be controlled by symbolic interaction in combination with the appropriate norms. The paper shows that this involves three kinds of norms: the desired effects of the system, norms needed to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TRMCS in TCOZ [formal specification]

    Publication Year: 2000, Page(s):63 - 72
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (584 KB)

    The design of complex systems requires powerful mechanisms for modeling data, state, communication, and real-time behaviour as well as for structuring and decomposing systems in order to control local complexity. Timed Communicating Object Z (TCOZ) builds on Object-Z's strengths in modeling complex data and state, and on timed CSP's strengths in modeling process control and real-time interactions.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.